General
-
Target
1144d0448fefe26f5b9db7e7a7522c9a46eded3a603daa903052373cecc92b27.exe
-
Size
188KB
-
Sample
250410-j89mgawvb1
-
MD5
db804c3f55c5d09dace40c76c99cab52
-
SHA1
e170f46854f3ccda006528b14ff09ecf5756cf5e
-
SHA256
1144d0448fefe26f5b9db7e7a7522c9a46eded3a603daa903052373cecc92b27
-
SHA512
dc3775844855ce5a8436cdcde4a2f03bd0dac73ed5ac89ab94e2bdc5f1891ea347a6a89db7224e6522ac58ba61e0e9efba1695e23828eeb65853a336553e1a47
-
SSDEEP
3072:Z0bRbeSCuF7PXuwFyoJ+mKTrZYzXlEmS6ZCHOoSnEYXosMM:Z2FeSCulPXuwIoWT9YlhD4dM
Static task
static1
Behavioral task
behavioral1
Sample
1144d0448fefe26f5b9db7e7a7522c9a46eded3a603daa903052373cecc92b27.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
1144d0448fefe26f5b9db7e7a7522c9a46eded3a603daa903052373cecc92b27.exe
-
Size
188KB
-
MD5
db804c3f55c5d09dace40c76c99cab52
-
SHA1
e170f46854f3ccda006528b14ff09ecf5756cf5e
-
SHA256
1144d0448fefe26f5b9db7e7a7522c9a46eded3a603daa903052373cecc92b27
-
SHA512
dc3775844855ce5a8436cdcde4a2f03bd0dac73ed5ac89ab94e2bdc5f1891ea347a6a89db7224e6522ac58ba61e0e9efba1695e23828eeb65853a336553e1a47
-
SSDEEP
3072:Z0bRbeSCuF7PXuwFyoJ+mKTrZYzXlEmS6ZCHOoSnEYXosMM:Z2FeSCulPXuwIoWT9YlhD4dM
Score10/10-
HelloKitty Ransomware
Ransomware family which has been active since late 2020, and in early 2021 a variant compromised the CDProjektRed game studio.
-
Hellokitty family
-
Renames multiple (180) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-